All fake apps in the cryptocurrency world, including wallets and exchanges, are basically scammed through Android phones. There are also some spyware that monitors your clipboard in the background. It is very common for novices to accidentally copy private keys or mnemonics and then have their wallets stolen. Be careful when using an iPhone. All software must be downloaded from the app store. Do not download beta versions, especially wallets. In short, when you are in the cryptocurrency world, fund security is the most important thing.
Regarding iPhone hardware security, according to official statements, all Apple devices are equipped with a Secure Enclave coprocessor. Simply put, this coprocessor is a black box in the iPhone that manages various passwords and user biometric information such as Touch ID and Face ID in the iPhone. It is independent of the CPU and all other processors and is specifically designed to protect user identity verification information for Apple phones.
iOS software security, if the hardware of Apple phones is "protected" by the secure isolation zone, its software is "escorted" by Apple's dedicated operating system. Apple's iOS system has two major features in terms of security:
First, Apple's applications can only be downloaded and installed through the official store (App Store). All applications must pass Apple's strict review before they can be put on the App Store, so that malicious code is killed at the source. Since the birth of the iPhone more than a decade ago, there has never been a single piece of malware on the iOS system (WWDC 2016); and according to a report from 360, there are tens of millions of malware on Android in China alone every year.
The second characteristic is that iOS is a closed system, and the permissions it grants to apps are very limited. All apps on the iOS system are sandboxed, and they are independent of each other. They can only read files in their own program file system, and cannot access other places. They are also clearly separated from the iOS system itself. Because the sandbox mechanism is safe and efficient, Android later learned from iOS and added a similar mechanism. In addition, the iOS system does not allow multiple apps to run at the same time in the foreground; the developer permissions of apps are also very limited. Apps can only access geographic location, address book, and enable push notifications with the user's permission.
On the other hand, due to its "open source" nature and the nature of allowing multiple apps to run in the foreground at the same time, Android apps can directly modify the operating system. According to unreliable news, a domestic app once modified the background operation mechanism. When the user clicks the Home button to return to the homepage, the app seems to stop running, but it actually shrinks to a pixel, so that the app can continue to run in the Android system without being noticed by the naked eye. This strange operation is intended to increase the usage time of the app and make the online user data look particularly good, so as to achieve the purpose of cutting investors' leeks. For users, if there are many apps running in the foreground at the same time, the Android phone will become slower and slower. If this is malware, it is very likely to be lurking in the background.
The third feature is the user privacy of the iPhone. Apple also pays great attention to user privacy in terms of security. The iPhone has a classic advertising slogan:
Apple's current CEO Tim Cook has repeatedly stated that Apple's business logic is to sell good products and that Apple is not interested in collecting user data. At its annual developer conference (WWDC), Apple has repeatedly emphasized user privacy and launched corresponding new features.
Despite its high-profile claims to protect user privacy, the iPhone has had its share of dark history. In 2014, the iCloud accounts of several Hollywood stars were hacked, resulting in the leakage of private photos; Apple later fixed the relevant vulnerabilities and strengthened the identity verification process. In 2019, Siri was exposed to recording user conversations without permission; Apple immediately issued a statement admitting the mistake and increased user permission.
Although Apple's system and mobile phones are not perfect and various security incidents have occurred, in comparison, Apple phones are still relatively safe phones on the market due to their hardware security settings, iOS's closed system, strict APP review mechanism, and Apple's emphasis on privacy.
Are you using Apple or Android? Do you think your phone is safe?